In the US, there has been recent concern over ISPs turning over logs to
the government. During the past few years, the idea of people snooping on
our private data (by governments and others) really has made encryption
more popular than ever before. One of the problems with encryption,
however, is that it's generally not user-friendly to add its protection
to your conversations. more>>

Cyber-attacks are now constant, threats to privacy are increasing, and more rigid
regulations are looming worldwide. To help IT folks relax in the face of these
challenges, Jetico updated its BestCrypt Container Encryption solution to include
Container Guard.
more>>

The Pretty Good Privacy (PGP) application, which has long been known as a
primary tool for file encryption, commonly focused on email. It has
management tools for exchanging credentials with peers and creating secure
communication channels over untrusted networks. more>>

Microsoft Windows is usually a presence in most computing environments, and UNIX
administrators likely will be forced to use resources in Windows networks from
time to time. Although many are familiar with the Samba server software, the matching
smbclient utility often escapes notice.
more>>

Usually I try to write articles that are not aimed at a particular
distribution. Although I may give examples assuming a Debian-based
distribution, whenever possible, I try to make my instructions applicable to
everyone. This is not going to be one of those articles. more>>

It used to be that only the paranoid among us focused on strict security
practices, yet these days, it seems like people are stepping up their games
with respect to encryption, password policy and how they
approach their computers in general. Although I always have considered myself more inside
that paranoid camp than outside of it, I even have found myself stepping up
my game lately. more>>

The special sauce in USMobile, Inc.'s Scrambl3, the mobile app that facilitates
"the world's most private calls and messages", is a set of open-source
components that create a top-secret-grade VPN, encryption algorithms and internet
protocols.
more>>

HTTPS is a small island of security in this insecure world, and in this day
and age, there is absolutely no reason not to have it on every Web site you
host. Up until last year, there was just a single last excuse: purchasing
certificates was kind of pricey. more>>

The Mozilla Foundation and the FBI recently have clashed over security
weaknesses. The FBI is aware of a weakness in the Tor browser that
may affect Firefox—it's a weakness the FBI has exploited during
an investigation.
more>>

I have been focusing a lot on security and privacy issues in this year's
columns so far, but I realize some of you may expect a different
kind of topic from me (or maybe are just tired of all this security
talk). Well, you are in luck. more>>